The interesting thing about information security and asset protection, is that it is interconnected with all the surrounding fields of profession. When it comes to cybersecurity, there are those who we refer to as cybersecurity professionals whose entire professional purpose is to ensure that information resources are impenetrable forces that can complete whatever their function is, so long as they are not compromised. This seems like a straightforward concept, but if there were not devices to perform function and networks for those devices to performs functions on and over, there would be no need for cybersecurity professionals. Thus, cybersecurity is interconnected and dependent upon other fields of information to even exist in the first place. Some of the primary concerns for cybersecurity professionals is the monitoring and intercepting of hackers with malicious intent using tactics such as malware or invasive hardware to compromise sensitive information. The access points that hackers can compromise information from are networks and physical hardware. Networks are information systems that allow the transmission of information. The transmission of an information entity, known as a packet, is referred to as signaling. Signaling transmits packets in the form of bits over a network. Network engineers design, structure, and implement the networks that allow for signaling to take place, while electrical engineers construct the exact process of how a bit is transmitted and what distance it can travel. Once a packet is broken down into bits, it must be reconfigured into a message interpretable by a human once it is delivered by the receiver. Computer scientists handle the organization of bits as well as the processes, protocols, and device software that determine the transmission of data. Software developers design the applications that run on the networks to provide optimal functionality for users, while business IT specialists study the motives and habits of users to optimize business productivity and user satisfaction. All the while, the security of information and sensitive data is backed by the security specialist in the field of cyber security.